IT Management  >   Systems Operations  >   Security  >  

Managing IT Security

RSS Feed    Add to Google    Add to My Yahoo!
Managing IT Security Reports
 
Cloud Secure Virtualization Datasheet
sponsored by IBM
DATA SHEET: Download this sheet to get the technical rundown on a cloud infrastructure that addresses in-house security needs with automated compliance controls and data security for virtualized cloud workloads. You'll learn how to establish virtual workload security down to the microchip level, and more.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

IBM

Understanding Software-Defined Security in Modern Software-Defined Networks
sponsored by Juniper Networks, Inc.
RESEARCH CONTENT: Read this ESG research report to discover the cybersecurity challenges that businesses are struggling to overcome like organizational silos and manual processes. Then, learn how the software-defined security network can solve these problems.
Posted: 06 Nov 2017 | Published: 31 Jan 2017

Juniper Networks, Inc.

Protecting the Financial Services Organization
sponsored by Juniper Networks, Inc.
WHITE PAPER: Click inside to learn how cyberattacks have grown and changed over the past several years, as several best practices already in place in financial service protection strategies that you can bring back to your organization.
Posted: 17 Nov 2017 | Published: 30 Jun 2017

Juniper Networks, Inc.

Security at Scale: Governance in AWS
sponsored by Amazon Web Services
WHITE PAPER: Access this white paper to explore the security and governance features built into AWS services that enable you to incorporate security benefits and best practices in building your integrated environment with AWS.
Posted: 09 Oct 2017 | Published: 30 Oct 2015

Amazon Web Services

Design and deliver cloud-based apps and data for flexible, on-demand IT
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how a cloud-based management platform can enable IT to deliver the right set of workspace services for each user—desktops, apps, data sharing and mobility management—into a secure mobile workspace that is accessible on any network from any device.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Citrix

The Case for Modern SOCs
sponsored by SearchSecurity.com
EZINE: In this issue of ISM we look at ways to optimize the next-gen SOC and integration and automation strategies that will help you get there. Additionally, our experts dive into Q&A with the Xerox CISO, how companies are using threat intelligence, why companies are failing to manage vulnerabilities in critical systems and applications, and more.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

SearchSecurity.com

How To Become A Superstar Security Leader
sponsored by Google Cloud
ANALYST REPORT: As companies seek to innovate and engage customers through digital channels, they need superstar security leaders. This report looks at the biggest changes in firms' expectations of their chief information security officers and provides specific examples of how top information security professionals rise to those occasions.
Posted: 18 Oct 2017 | Published: 13 Feb 2017

Google Cloud

What you Need to Know About Cloud Security
sponsored by Arctic Wolf Networks, Inc.
EBOOK: In this e-book, gain a stronger understanding of the 3 most prominent types of cloud services and the questions your organization should ask when building a network security platform.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Arctic Wolf Networks, Inc.

Outsmarting Malware
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn about how you can combine adaptable machine learning algorithms with anti-malware technologies to give you the edge over evolving cyber-threats.
Posted: 06 Nov 2017 | Published: 30 Nov 2016

Juniper Networks, Inc.

DDoS Emerges as Primary Threat Vector for IoT
sponsored by Arbor Networks
RESEARCH CONTENT: In this Frost & Sullivan research report, learn about the growing threat of IoT-based DDoS attacks and see how many organizations are defending against them.
Posted: 20 Oct 2017 | Published: 11 Nov 2016

Arbor Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement